Sciweavers

2520 search results - page 394 / 504
» Knowledge Management Challenges in Knowledge Discovery Syste...
Sort
View
CCS
2011
ACM
14 years 4 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
KDD
2012
ACM
220views Data Mining» more  KDD 2012»
13 years 6 months ago
ComSoc: adaptive transfer of user behaviors over composite social network
Accurate prediction of user behaviors is important for many social media applications, including social marketing, personalization and recommendation, etc. A major challenge lies ...
ErHeng Zhong, Wei Fan, Junwei Wang, Lei Xiao, Yong...
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
16 years 4 months ago
Mining relational data through correlation-based multiple view validation
Commercial relational databases currently store vast amounts of real-world data. The data within these relational repositories are represented by multiple relations, which are int...
Hongyu Guo, Herna L. Viktor
CORR
2010
Springer
193views Education» more  CORR 2010»
15 years 3 months ago
A Probabilistic Approach for Learning Folksonomies from Structured Data
Learning structured representations has emerged as an important problem in many domains, including document and Web data mining, bioinformatics, and image analysis. One approach t...
Anon Plangprasopchok, Kristina Lerman, Lise Getoor
CN
2010
109views more  CN 2010»
15 years 4 months ago
A taxonomy of biologically inspired research in computer networking
The natural world is enormous, dynamic, incredibly diverse, and highly complex. Despite the inherent challenges of surviving in such a world, biological organisms evolve, self-org...
Michael Meisel, Vasileios Pappas, Lixia Zhang